Breaking Down the 2014 Trustwave Global Security Report

The 2014 Trustwave Global Security Report has just been released – and the findings are more important than ever for your organization. While businesses have improved their time to detection of breaches substantially, cybercriminals continue to find new ways to steal data – and new types of data to steal. A sample of what you'll hear:

• The volume of data breach investigations increased 54% over 2012
• Weak passwords open the door in 31% of data compromises
• We saw a 33% increase in the theft of non-payment card
• Self-detection can significantly shorten the timeline from detection to containment

Your organization has its own unique IT infrastructure, business model, risk profile and tolerance. The best strategy for streamlining your annual Payment Card Industry (PCI) validation process is to make sure that your Qualified Security Assessor Company (QSA-C) employs a sound and forward-looking methodology for your assessments. A key first step is understanding the critical differences between risk acceptance and risk mitigation and the implications for your business.

Tune in to learn best practices in PCI services methodology and how they apply to your specific requirements. Michael Aminzade, VP of Global Compliance and Risk Services at Trustwave, will discuss:

Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. These next level threats are so lucrative that they are accelerating hacking innovations and exploding attack frequencies. Ransomware damages user productivity, creates emergency work for IT and at least one CEO has been fired because of CEO email fraud. Security solutions and users have to be smarter than ever before.

Our Trustwave SpiderLabs researchers, security experts and thought leaders have gathered valuable insights and examples on how to help prevent ransomware and CEO fraud. We will be sharing their findings with you during this webinar, including:

• What these attacks look like to your users.
• The essentials and limitations of user training.
• Which automated techniques are most effective at stopping unknown attacks.

Join Alexander Norell, Director of Global Risk and Compliance Services at Trustwave, as he shares his insider view of what you can expect at the upcoming 2016 Payment Card Industry Security Standards Council (PCI SSC) Europe Community Meeting in October.

Alexander’s findings will be based on what he learns from his attendance at the North America Community Meeting and his insight as a subject matter expert on PCI compliance.

During the webinar, Alexander will:

• Alert you to trending topics and their implications
• Share takeaways from participants as well as SSC leaders
• Analyse the impact to the European community

Michael Osterman, President of Osterman Research, Inc., and Kevin Overcash, Director of SpiderLabs North America at Trustwave

One in five businesses don’t test for security vulnerabilities. A recent study by Osterman Research found that many businesses fail to conduct frequent security testing despite believing that it’s critically important to securing their systems and data.

In this presentation Michael Osterman, President of Osterman Research, Inc., will discuss key findings from the “Security Testing Practices and Priorities: An Osterman Research Survey Report”, including:

•Common types of security issues experienced in the past 12 months.
•The extent to which organizations take a proactive approach to security testing.
•Types of security testing conducted during the past 6 months.
•How often organizations conduct detailed review of security tests.
•Challenges faced by organizations in the context of security testing.

Trustwave offers advice for those looking to take back control of their cyber destinies. Cybercrime has become a world-wide epidemic as organized crime syndicates are literally making money hand over fist in extorting businesses or otherwise stealing valuable data and company assets. Combined with a global shortage of trained security professionals and you literally have "The Perfect Storm" of cybercriminal activity.

Join Trustwave SpiderLabs cybersecurity expert, Brian Hussey, as he discusses how you can get ahead of today’s cybercrime ‘super storm’ with some simple steps and key solutions. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business. Join our webinar to help:

-Understand who is targeting you.
-Get a handle on just how they are doing it.
-Learn some key tactics and solutions to combat today’s modern cybercriminal.

More malware today is machine-generated and one-off. With advanced malware also employing obfuscation and anti-sandboxing techniques, just how "secure" are secure web gateways? The reality is - many are just not that secure anymore. Based on 2015 breach investigations, Trustwave found that 42% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content.

Join our webinar where we will cover practical steps nearly any organization can take to optimize protection and policy control for your web users. We will be discussing real-world ideas on how to:
-Ensure real-time blocking of encrypted new malware.
-Easily keep policy optimized.
-Virtually patch web browsers, and more.

Web application security differs significantly from other information security disciplines. In addition to encompassing other security disciplines such as encryption, authentication, network and operating system security, it requires specialized knowledge of web applications and coding techniques. Due to its abstract and multifaceted nature, it understandably may elude the grasp of executive management (“but we have a firewall . . .”) and, as a result, find itself at the bottom of the security budget totem pole.

In this presentation we will discuss the role that application security plays within enterprise security and points to evaluate when developing an effective and efficient web application security program that meets your considerations. Join this webinar to learn more about:

•The current state of web application security and its relationship to enterprise security.
•Why web application security is more complex than other security disciplines.
•The tasks that need to be performed in application security.
•The different methods of web application testing and mitigation.
•Available implementation options based on the in-house resource and budget constraints.

We will conclude the session with a discussion of a web application security methodology that will utilize the specialized skills of different members of your IT organization.

Payment Card Industry Data Security Standard (PCI DSS) 3.2 has now been announced - organizations who must comply need to understand the implications. Join us to learn more about the drivers for the early release of the mandate and how you can best prepare your organization.

Attend this webinar for helpful insights about:

-The scope of the new PCI DSS 3.2
-What the updates mean for your business?
-Why you would want to make these changes even if they weren’t mandated?
-What may be on the horizon?

The 2016 Trustwave Global Security Report has just been released. The report offers a glimpse into the secret world of cybercrime organizations and details methods used to maximize profits from malicious attacks. The report also highlights how adaptable, creative and relentless cybercriminals are when it comes to getting access to the information they want.

Join this webinar as we highlight our major findings and offer you a chance to:
• Learn how cybercriminals changed tactics in 2015 and started targeting a greater variety of data.
• Hear an in-depth analysis of the top cybercrime, data breach and security threat trends from 2015.
• Get key insights on how to best defend your business assets amidst the evolving threat landscape and varying tactics of cybercriminals.

The 2016 Trustwave Global Security Report has just been released. The report offers a glimpse into the secret world of cybercrime organizations and details methods used to maximize profits from malicious attacks. The report also highlights how adaptable, creative and relentless cybercriminals are when it comes to getting access to the information they want.

Join this webinar as we highlight our major findings and offer you a chance to:
• Learn how cybercriminals changed tactics in 2015 and started targeting a greater variety of data.
• Hear an in-depth analysis of the top cybercrime, data breach and security threat trends from 2015.
• Get key insights on how to best defend your business assets amidst the evolving threat landscape and varying tactics of cybercriminals.

Security pressures are mounting - and there are more of them than ever before. We know you're under stress, understaffed, and likely, already under attack. Trustwave surveyed 1,414 information security professionals to understand the emotional factors that contribute to a security professional’s headaches and hardships. Join us to learn how to alleviate these pain points and escape the pressure.

During this webinar we will break down the findings of the 2016 Security Pressures Report from Trustwave, including:

• Do security pros feel they have enough skills and personnel?
• How have overall security pressures changed year over year?
• What are some practical recommendations you can implement in your organization to reduce the pressure?

It is always a good idea to be prepared. A quick and efficient response to an attack on your network can save an untold amount of time, money and staff hours. Even more, in today’s risk environment you need to know what tools to have in place to flag potential indicators of a compromise, have a response team on the ready and have a digital evidence trail for legal protection.
Join us for an interactive discussion with guest speaker, 451 Research Senior Analyst, Eric Ogren and Trustwave SpiderLabs Global Director of Incident Response and Digital Forensics, Brian Hussey, to learn more about what you should do before, during and after a breach. Help drive the conversation by submitting a question for Eric and Brian in advance so we can tackle your biggest security concerns such as:
• What is the likelihood of getting breached?
• Best practices around building an IR plan
• If you’ve been breached, what is the first thing you should do?

Join Trustwave for a deeper look at the topics highlighted in our new e-book, The Security Survival Guide for Growing Businesses. To help you navigate the many challenges around information security, we will focus on some key questions including:

• Is your security growing with your business?
• Do you have a viable plan to handle the 3 biggest security challenges facing growing businesses?
• Where should you begin?

In this interactive session, find out what your peers are most concerned with, how they prioritize, and what works best for reducing risk. We will feature a couple of real world examples of breach incidents, discuss how the breaches occurred and simple steps you can take to prevent your business from becoming the next victim.

As breaches of the network perimeter become more common, organisations that safeguard data where it lives - in the database - will prevail. Data stores are an enticing target for cybercriminals. This is only amplified by the common misconception many organisations have that their database assets - whether they are on premise, in a datacenter or in the cloud - are secure.

So, where do you start? What can you do right now to secure your databases with authority and finesse?

Join this webinar and learn:
• The top five threats to database security
• How a real-life database attack unfolds
• The five quickest, highest-impact actions you can take right now to harden your databases

BONUS: Attendees may be eligible for a 6-month database security assessment tool license at no cost.

As breaches of the network perimeter become more common, organizations that safeguard data where it lives - in the database - will prevail. Data stores are an enticing target for cybercriminals. This is only amplified by the common misconception many organizations have that their database assets - whether they are on premise, in a datacenter or in the cloud - are secure.

So, where do you start? What can you do right now to secure your databases with authority and finesse?

Join this webinar and learn:
• The top five threats to database security
• How a real-life database attack unfolds with Trustwave SpiderLabs Senior Security Researcher, Martin Rakhmanov
• The five quickest, highest-impact actions you can take right now to harden your databases

BONUS: Attendees may be eligible for a 6-month database security assessment tool license at no cost.

With smartphones and tablets rapidly replacing desktop computers and wearables and Internet of Things connectivity merging in to the expanding mobile landscape, it’s critical that the scope of your security practices move beyond BYOD and the confines of your corporate network. Tune in to our webinar, “The Wild Wild West of Secure Mobility: How to Holster Up & Win in a Lawless Land,” for new perspectives about protecting your mobile business as you venture ahead.

During this webinar you will learn about:
• Today’s mobility landscape
• Tips for keeping the bad guys out
• New frontiers: Cost-effective solutions for today and tomorrow

Advanced threat techniques are available for purchase by cybercriminals who now target companies of all sizes for quick cash at high ROI. If you don’t have an army of IT security specialists and an unlimited IT budget, you’re probably feeling overwhelmed by the always-changing threat.
Join us for an informative webinar, “7 Secrets to Defending Against New Advanced Threats on a Budget.”

During this webinar you will learn the:
•Business dynamics accelerating advanced threat use by criminals
•Critical choke points that almost all advanced threats have to go through to succeed
•Tips for the most cost-effective and achievable ways to stop advanced threats today and tomorrow

Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than 2.7 million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com.